[Android WebView] Fix webview perf bot switchover to use org.chromium.webview_shell...
[chromium-blink-merge.git] / content / app / content_main_runner.cc
blobcdb519f53a75c7737c87292ba19cb8c0c89635a1
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "content/public/app/content_main_runner.h"
7 #include <stdlib.h>
9 #include "base/allocator/allocator_extension.h"
10 #include "base/at_exit.h"
11 #include "base/command_line.h"
12 #include "base/debug/debugger.h"
13 #include "base/files/file_path.h"
14 #include "base/i18n/icu_util.h"
15 #include "base/lazy_instance.h"
16 #include "base/logging.h"
17 #include "base/memory/scoped_ptr.h"
18 #include "base/memory/scoped_vector.h"
19 #include "base/metrics/statistics_recorder.h"
20 #include "base/path_service.h"
21 #include "base/process/launch.h"
22 #include "base/process/memory.h"
23 #include "base/process/process_handle.h"
24 #include "base/profiler/alternate_timer.h"
25 #include "base/profiler/scoped_tracker.h"
26 #include "base/strings/string_number_conversions.h"
27 #include "base/strings/string_util.h"
28 #include "base/strings/stringprintf.h"
29 #include "base/trace_event/trace_event.h"
30 #include "content/browser/browser_main.h"
31 #include "content/common/set_process_title.h"
32 #include "content/common/url_schemes.h"
33 #include "content/gpu/in_process_gpu_thread.h"
34 #include "content/public/app/content_main.h"
35 #include "content/public/app/content_main_delegate.h"
36 #include "content/public/app/startup_helper_win.h"
37 #include "content/public/browser/content_browser_client.h"
38 #include "content/public/common/content_client.h"
39 #include "content/public/common/content_constants.h"
40 #include "content/public/common/content_paths.h"
41 #include "content/public/common/content_switches.h"
42 #include "content/public/common/main_function_params.h"
43 #include "content/public/common/sandbox_init.h"
44 #include "content/renderer/in_process_renderer_thread.h"
45 #include "content/utility/in_process_utility_thread.h"
46 #include "crypto/nss_util.h"
47 #include "ipc/ipc_descriptors.h"
48 #include "ipc/ipc_switches.h"
49 #include "media/base/media.h"
50 #include "sandbox/win/src/sandbox_types.h"
51 #include "ui/base/ui_base_paths.h"
52 #include "ui/base/ui_base_switches.h"
54 #ifdef V8_USE_EXTERNAL_STARTUP_DATA
55 #include "gin/v8_initializer.h"
56 #endif
58 #if defined(USE_TCMALLOC)
59 #include "third_party/tcmalloc/chromium/src/gperftools/malloc_extension.h"
60 #if defined(TYPE_PROFILING)
61 #include "base/allocator/type_profiler.h"
62 #include "base/allocator/type_profiler_tcmalloc.h"
63 #endif
64 #endif
66 #if !defined(OS_IOS)
67 #include "content/app/mojo/mojo_init.h"
68 #include "content/browser/gpu/gpu_process_host.h"
69 #include "content/browser/renderer_host/render_process_host_impl.h"
70 #include "content/browser/utility_process_host_impl.h"
71 #include "content/public/plugin/content_plugin_client.h"
72 #include "content/public/renderer/content_renderer_client.h"
73 #include "content/public/utility/content_utility_client.h"
74 #endif
76 #if defined(OS_WIN)
77 #include <malloc.h>
78 #include <cstring>
80 #include "base/strings/string_number_conversions.h"
81 #include "base/trace_event/trace_event_etw_export_win.h"
82 #include "ui/base/win/atl_module.h"
83 #include "ui/gfx/win/dpi.h"
84 #elif defined(OS_MACOSX)
85 #include "base/mac/scoped_nsautorelease_pool.h"
86 #if !defined(OS_IOS)
87 #include "base/power_monitor/power_monitor_device_source.h"
88 #include "content/app/mac/mac_init.h"
89 #include "content/browser/browser_io_surface_manager_mac.h"
90 #include "content/browser/mach_broker_mac.h"
91 #include "content/child/child_io_surface_manager_mac.h"
92 #include "content/common/sandbox_init_mac.h"
93 #endif // !OS_IOS
94 #endif // OS_WIN
96 #if defined(OS_POSIX)
97 #include <signal.h>
99 #include "base/posix/global_descriptors.h"
100 #include "content/public/common/content_descriptors.h"
102 #if !defined(OS_MACOSX)
103 #include "content/public/common/content_descriptors.h"
104 #include "content/public/common/zygote_fork_delegate_linux.h"
105 #endif
106 #if !defined(OS_MACOSX) && !defined(OS_ANDROID)
107 #include "content/zygote/zygote_main.h"
108 #endif
110 #endif // OS_POSIX
112 #if !defined(OS_MACOSX) && defined(USE_TCMALLOC)
113 extern "C" {
114 int tc_set_new_mode(int mode);
116 #endif
118 namespace content {
119 extern int GpuMain(const content::MainFunctionParams&);
120 #if defined(ENABLE_PLUGINS)
121 #if !defined(OS_LINUX)
122 extern int PluginMain(const content::MainFunctionParams&);
123 #endif
124 extern int PpapiPluginMain(const MainFunctionParams&);
125 extern int PpapiBrokerMain(const MainFunctionParams&);
126 #endif
127 extern int RendererMain(const content::MainFunctionParams&);
128 extern int UtilityMain(const MainFunctionParams&);
129 } // namespace content
131 namespace content {
133 #if !defined(CHROME_MULTIPLE_DLL_CHILD)
134 base::LazyInstance<ContentBrowserClient>
135 g_empty_content_browser_client = LAZY_INSTANCE_INITIALIZER;
136 #endif // !CHROME_MULTIPLE_DLL_CHILD
138 #if !defined(OS_IOS) && !defined(CHROME_MULTIPLE_DLL_BROWSER)
139 base::LazyInstance<ContentPluginClient>
140 g_empty_content_plugin_client = LAZY_INSTANCE_INITIALIZER;
141 base::LazyInstance<ContentRendererClient>
142 g_empty_content_renderer_client = LAZY_INSTANCE_INITIALIZER;
143 base::LazyInstance<ContentUtilityClient>
144 g_empty_content_utility_client = LAZY_INSTANCE_INITIALIZER;
145 #endif // !OS_IOS && !CHROME_MULTIPLE_DLL_BROWSER
147 #if defined(OS_WIN)
149 #endif // defined(OS_WIN)
151 #if defined(OS_POSIX) && !defined(OS_IOS)
153 // Setup signal-handling state: resanitize most signals, ignore SIGPIPE.
154 void SetupSignalHandlers() {
155 // Sanitise our signal handling state. Signals that were ignored by our
156 // parent will also be ignored by us. We also inherit our parent's sigmask.
157 sigset_t empty_signal_set;
158 CHECK(0 == sigemptyset(&empty_signal_set));
159 CHECK(0 == sigprocmask(SIG_SETMASK, &empty_signal_set, NULL));
161 struct sigaction sigact;
162 memset(&sigact, 0, sizeof(sigact));
163 sigact.sa_handler = SIG_DFL;
164 static const int signals_to_reset[] =
165 {SIGHUP, SIGINT, SIGQUIT, SIGILL, SIGABRT, SIGFPE, SIGSEGV,
166 SIGALRM, SIGTERM, SIGCHLD, SIGBUS, SIGTRAP}; // SIGPIPE is set below.
167 for (unsigned i = 0; i < arraysize(signals_to_reset); i++) {
168 CHECK(0 == sigaction(signals_to_reset[i], &sigact, NULL));
171 // Always ignore SIGPIPE. We check the return value of write().
172 CHECK(signal(SIGPIPE, SIG_IGN) != SIG_ERR);
175 #endif // OS_POSIX && !OS_IOS
177 void CommonSubprocessInit(const std::string& process_type) {
178 #if defined(OS_WIN)
179 // HACK: Let Windows know that we have started. This is needed to suppress
180 // the IDC_APPSTARTING cursor from being displayed for a prolonged period
181 // while a subprocess is starting.
182 PostThreadMessage(GetCurrentThreadId(), WM_NULL, 0, 0);
183 MSG msg;
184 PeekMessage(&msg, NULL, 0, 0, PM_REMOVE);
185 #endif
186 #if defined(OS_POSIX) && !defined(OS_MACOSX) && !defined(OS_ANDROID)
187 // Various things break when you're using a locale where the decimal
188 // separator isn't a period. See e.g. bugs 22782 and 39964. For
189 // all processes except the browser process (where we call system
190 // APIs that may rely on the correct locale for formatting numbers
191 // when presenting them to the user), reset the locale for numeric
192 // formatting.
193 // Note that this is not correct for plugin processes -- they can
194 // surface UI -- but it's likely they get this wrong too so why not.
195 setlocale(LC_NUMERIC, "C");
196 #endif
199 // Only needed on Windows for creating stats tables.
200 #if defined(OS_WIN)
201 static base::ProcessId GetBrowserPid(const base::CommandLine& command_line) {
202 base::ProcessId browser_pid = base::GetCurrentProcId();
203 if (command_line.HasSwitch(switches::kProcessChannelID)) {
204 std::string channel_name =
205 command_line.GetSwitchValueASCII(switches::kProcessChannelID);
207 int browser_pid_int;
208 base::StringToInt(channel_name, &browser_pid_int);
209 browser_pid = static_cast<base::ProcessId>(browser_pid_int);
210 DCHECK_NE(browser_pid_int, 0);
212 return browser_pid;
214 #endif
216 class ContentClientInitializer {
217 public:
218 static void Set(const std::string& process_type,
219 ContentMainDelegate* delegate) {
220 ContentClient* content_client = GetContentClient();
221 #if !defined(CHROME_MULTIPLE_DLL_CHILD)
222 if (process_type.empty()) {
223 if (delegate)
224 content_client->browser_ = delegate->CreateContentBrowserClient();
225 if (!content_client->browser_)
226 content_client->browser_ = &g_empty_content_browser_client.Get();
228 #endif // !CHROME_MULTIPLE_DLL_CHILD
230 #if !defined(OS_IOS) && !defined(CHROME_MULTIPLE_DLL_BROWSER)
231 if (process_type == switches::kPluginProcess ||
232 process_type == switches::kPpapiPluginProcess) {
233 if (delegate)
234 content_client->plugin_ = delegate->CreateContentPluginClient();
235 if (!content_client->plugin_)
236 content_client->plugin_ = &g_empty_content_plugin_client.Get();
237 // Single process not supported in split dll mode.
238 } else if (process_type == switches::kRendererProcess ||
239 base::CommandLine::ForCurrentProcess()->HasSwitch(
240 switches::kSingleProcess)) {
241 if (delegate)
242 content_client->renderer_ = delegate->CreateContentRendererClient();
243 if (!content_client->renderer_)
244 content_client->renderer_ = &g_empty_content_renderer_client.Get();
247 if (process_type == switches::kUtilityProcess ||
248 base::CommandLine::ForCurrentProcess()->HasSwitch(
249 switches::kSingleProcess)) {
250 if (delegate)
251 content_client->utility_ = delegate->CreateContentUtilityClient();
252 // TODO(scottmg): http://crbug.com/237249 Should be in _child.
253 if (!content_client->utility_)
254 content_client->utility_ = &g_empty_content_utility_client.Get();
256 #endif // !OS_IOS && !CHROME_MULTIPLE_DLL_BROWSER
260 // We dispatch to a process-type-specific FooMain() based on a command-line
261 // flag. This struct is used to build a table of (flag, main function) pairs.
262 struct MainFunction {
263 const char* name;
264 int (*function)(const MainFunctionParams&);
267 #if defined(OS_POSIX) && !defined(OS_MACOSX) && !defined(OS_ANDROID)
268 // On platforms that use the zygote, we have a special subset of
269 // subprocesses that are launched via the zygote. This function
270 // fills in some process-launching bits around ZygoteMain().
271 // Returns the exit code of the subprocess.
272 int RunZygote(const MainFunctionParams& main_function_params,
273 ContentMainDelegate* delegate) {
274 static const MainFunction kMainFunctions[] = {
275 { switches::kRendererProcess, RendererMain },
276 #if defined(ENABLE_PLUGINS)
277 { switches::kPpapiPluginProcess, PpapiPluginMain },
278 #endif
279 { switches::kUtilityProcess, UtilityMain },
282 ScopedVector<ZygoteForkDelegate> zygote_fork_delegates;
283 if (delegate) {
284 delegate->ZygoteStarting(&zygote_fork_delegates);
285 media::InitializeMediaLibrary();
288 // This function call can return multiple times, once per fork().
289 if (!ZygoteMain(main_function_params, zygote_fork_delegates.Pass()))
290 return 1;
292 if (delegate) delegate->ZygoteForked();
294 // Zygote::HandleForkRequest may have reallocated the command
295 // line so update it here with the new version.
296 const base::CommandLine& command_line =
297 *base::CommandLine::ForCurrentProcess();
298 std::string process_type =
299 command_line.GetSwitchValueASCII(switches::kProcessType);
300 ContentClientInitializer::Set(process_type, delegate);
302 MainFunctionParams main_params(command_line);
303 main_params.zygote_child = true;
305 for (size_t i = 0; i < arraysize(kMainFunctions); ++i) {
306 if (process_type == kMainFunctions[i].name)
307 return kMainFunctions[i].function(main_params);
310 if (delegate)
311 return delegate->RunProcess(process_type, main_params);
313 NOTREACHED() << "Unknown zygote process type: " << process_type;
314 return 1;
316 #endif // defined(OS_POSIX) && !defined(OS_MACOSX) && !defined(OS_ANDROID)
318 #if !defined(OS_IOS)
319 static void RegisterMainThreadFactories() {
320 #if !defined(CHROME_MULTIPLE_DLL_BROWSER) && !defined(CHROME_MULTIPLE_DLL_CHILD)
321 UtilityProcessHostImpl::RegisterUtilityMainThreadFactory(
322 CreateInProcessUtilityThread);
323 RenderProcessHostImpl::RegisterRendererMainThreadFactory(
324 CreateInProcessRendererThread);
325 GpuProcessHost::RegisterGpuMainThreadFactory(
326 CreateInProcessGpuThread);
327 #else
328 base::CommandLine& command_line = *base::CommandLine::ForCurrentProcess();
329 if (command_line.HasSwitch(switches::kSingleProcess)) {
330 LOG(FATAL) <<
331 "--single-process is not supported in chrome multiple dll browser.";
333 if (command_line.HasSwitch(switches::kInProcessGPU)) {
334 LOG(FATAL) <<
335 "--in-process-gpu is not supported in chrome multiple dll browser.";
337 #endif // !CHROME_MULTIPLE_DLL_BROWSER && !CHROME_MULTIPLE_DLL_CHILD
340 // Run the FooMain() for a given process type.
341 // If |process_type| is empty, runs BrowserMain().
342 // Returns the exit code for this process.
343 int RunNamedProcessTypeMain(
344 const std::string& process_type,
345 const MainFunctionParams& main_function_params,
346 ContentMainDelegate* delegate) {
347 static const MainFunction kMainFunctions[] = {
348 #if !defined(CHROME_MULTIPLE_DLL_CHILD)
349 { "", BrowserMain },
350 #endif
351 #if !defined(CHROME_MULTIPLE_DLL_BROWSER)
352 #if defined(ENABLE_PLUGINS)
353 #if !defined(OS_LINUX)
354 { switches::kPluginProcess, PluginMain },
355 #endif
356 { switches::kPpapiPluginProcess, PpapiPluginMain },
357 { switches::kPpapiBrokerProcess, PpapiBrokerMain },
358 #endif // ENABLE_PLUGINS
359 { switches::kUtilityProcess, UtilityMain },
360 { switches::kRendererProcess, RendererMain },
361 { switches::kGpuProcess, GpuMain },
362 #endif // !CHROME_MULTIPLE_DLL_BROWSER
365 RegisterMainThreadFactories();
367 for (size_t i = 0; i < arraysize(kMainFunctions); ++i) {
368 if (process_type == kMainFunctions[i].name) {
369 if (delegate) {
370 int exit_code = delegate->RunProcess(process_type,
371 main_function_params);
372 #if defined(OS_ANDROID)
373 // In Android's browser process, the negative exit code doesn't mean the
374 // default behavior should be used as the UI message loop is managed by
375 // the Java and the browser process's default behavior is always
376 // overridden.
377 if (process_type.empty())
378 return exit_code;
379 #endif
380 if (exit_code >= 0)
381 return exit_code;
383 return kMainFunctions[i].function(main_function_params);
387 #if defined(OS_POSIX) && !defined(OS_MACOSX) && !defined(OS_ANDROID)
388 // Zygote startup is special -- see RunZygote comments above
389 // for why we don't use ZygoteMain directly.
390 if (process_type == switches::kZygoteProcess)
391 return RunZygote(main_function_params, delegate);
392 #endif
394 // If it's a process we don't know about, the embedder should know.
395 if (delegate)
396 return delegate->RunProcess(process_type, main_function_params);
398 NOTREACHED() << "Unknown process type: " << process_type;
399 return 1;
401 #endif // !OS_IOS
403 class ContentMainRunnerImpl : public ContentMainRunner {
404 public:
405 ContentMainRunnerImpl()
406 : is_initialized_(false),
407 is_shutdown_(false),
408 completed_basic_startup_(false),
409 delegate_(NULL),
410 ui_task_(NULL) {
411 #if defined(OS_WIN)
412 memset(&sandbox_info_, 0, sizeof(sandbox_info_));
413 #endif
416 ~ContentMainRunnerImpl() override {
417 if (is_initialized_ && !is_shutdown_)
418 Shutdown();
421 #if defined(USE_TCMALLOC)
422 static bool GetAllocatorWasteSizeThunk(size_t* size) {
423 size_t heap_size, allocated_bytes, unmapped_bytes;
424 MallocExtension* ext = MallocExtension::instance();
425 if (ext->GetNumericProperty("generic.heap_size", &heap_size) &&
426 ext->GetNumericProperty("generic.current_allocated_bytes",
427 &allocated_bytes) &&
428 ext->GetNumericProperty("tcmalloc.pageheap_unmapped_bytes",
429 &unmapped_bytes)) {
430 *size = heap_size - allocated_bytes - unmapped_bytes;
431 return true;
433 DCHECK(false);
434 return false;
437 static void GetStatsThunk(char* buffer, int buffer_length) {
438 MallocExtension::instance()->GetStats(buffer, buffer_length);
441 static void ReleaseFreeMemoryThunk() {
442 MallocExtension::instance()->ReleaseFreeMemory();
444 #endif
446 int Initialize(const ContentMainParams& params) override {
447 ui_task_ = params.ui_task;
449 base::EnableTerminationOnOutOfMemory();
450 #if defined(OS_WIN)
451 RegisterInvalidParamHandler();
452 ui::win::CreateATLModuleIfNeeded();
454 sandbox_info_ = *params.sandbox_info;
455 #else // !OS_WIN
457 #if defined(OS_ANDROID)
458 // See note at the initialization of ExitManager, below; basically,
459 // only Android builds have the ctor/dtor handlers set up to use
460 // TRACE_EVENT right away.
461 TRACE_EVENT0("startup", "ContentMainRunnerImpl::Initialize");
462 #endif // OS_ANDROID
464 // NOTE(willchan): One might ask why these TCMalloc-related calls are done
465 // here rather than in process_util_linux.cc with the definition of
466 // EnableTerminationOnOutOfMemory(). That's because base shouldn't have a
467 // dependency on TCMalloc. Really, we ought to have our allocator shim code
468 // implement this EnableTerminationOnOutOfMemory() function. Whateverz.
469 // This works for now.
470 #if !defined(OS_MACOSX) && defined(USE_TCMALLOC)
472 #if defined(TYPE_PROFILING)
473 base::type_profiler::InterceptFunctions::SetFunctions(
474 base::type_profiler::NewInterceptForTCMalloc,
475 base::type_profiler::DeleteInterceptForTCMalloc);
476 #endif
478 // For tcmalloc, we need to tell it to behave like new.
479 tc_set_new_mode(1);
481 // On windows, we've already set these thunks up in _heap_init()
482 base::allocator::SetGetAllocatorWasteSizeFunction(
483 GetAllocatorWasteSizeThunk);
484 base::allocator::SetGetStatsFunction(GetStatsThunk);
485 base::allocator::SetReleaseFreeMemoryFunction(ReleaseFreeMemoryThunk);
487 // Provide optional hook for monitoring allocation quantities on a
488 // per-thread basis. Only set the hook if the environment indicates this
489 // needs to be enabled.
490 const char* profiling = getenv(tracked_objects::kAlternateProfilerTime);
491 if (profiling &&
492 (atoi(profiling) == tracked_objects::TIME_SOURCE_TYPE_TCMALLOC)) {
493 tracked_objects::SetAlternateTimeSource(
494 MallocExtension::GetBytesAllocatedOnCurrentThread,
495 tracked_objects::TIME_SOURCE_TYPE_TCMALLOC);
497 #endif // !OS_MACOSX && USE_TCMALLOC
499 #if !defined(OS_IOS)
500 base::GlobalDescriptors* g_fds = base::GlobalDescriptors::GetInstance();
501 #endif
503 // On Android,
504 // - setlocale() is not supported.
505 // - We do not override the signal handlers so that we can get
506 // stack trace when crashing.
507 // - The ipc_fd is passed through the Java service.
508 // Thus, these are all disabled.
509 #if !defined(OS_ANDROID) && !defined(OS_IOS)
510 // Set C library locale to make sure CommandLine can parse argument values
511 // in correct encoding.
512 setlocale(LC_ALL, "");
514 SetupSignalHandlers();
515 g_fds->Set(kPrimaryIPCChannel,
516 kPrimaryIPCChannel + base::GlobalDescriptors::kBaseDescriptor);
517 #endif // !OS_ANDROID && !OS_IOS
519 #if defined(OS_LINUX) || defined(OS_OPENBSD)
520 g_fds->Set(kCrashDumpSignal,
521 kCrashDumpSignal + base::GlobalDescriptors::kBaseDescriptor);
522 #endif // OS_LINUX || OS_OPENBSD
525 #endif // !OS_WIN
527 is_initialized_ = true;
528 delegate_ = params.delegate;
530 // The exit manager is in charge of calling the dtors of singleton objects.
531 // On Android, AtExitManager is set up when library is loaded.
532 // On iOS, it's set up in main(), which can't call directly through to here.
533 // A consequence of this is that you can't use the ctor/dtor-based
534 // TRACE_EVENT methods on Linux or iOS builds till after we set this up.
535 #if !defined(OS_ANDROID) && !defined(OS_IOS)
536 if (!ui_task_) {
537 // When running browser tests, don't create a second AtExitManager as that
538 // interfers with shutdown when objects created before ContentMain is
539 // called are destructed when it returns.
540 exit_manager_.reset(new base::AtExitManager);
542 #endif // !OS_ANDROID && !OS_IOS
544 // Don't create this loop on iOS, since the outer loop is already handled
545 // and a loop that's destroyed in shutdown interleaves badly with the event
546 // loop pool on iOS.
547 #if defined(OS_MACOSX) && !defined(OS_IOS)
548 // We need this pool for all the objects created before we get to the
549 // event loop, but we don't want to leave them hanging around until the
550 // app quits. Each "main" needs to flush this pool right before it goes into
551 // its main event loop to get rid of the cruft.
552 autorelease_pool_.reset(new base::mac::ScopedNSAutoreleasePool());
553 InitializeMac();
554 #endif
556 // On Android, the command line is initialized when library is loaded and
557 // we have already started our TRACE_EVENT0.
558 #if !defined(OS_ANDROID)
559 // argc/argv are ignored on Windows and Android; see command_line.h for
560 // details.
561 int argc = 0;
562 const char** argv = NULL;
564 #if !defined(OS_WIN)
565 argc = params.argc;
566 argv = params.argv;
567 #endif
569 base::CommandLine::Init(argc, argv);
571 base::EnableTerminationOnHeapCorruption();
573 // TODO(yiyaoliu, vadimt): Remove this once crbug.com/453640 is fixed.
574 // Enable profiler recording right after command line is initialized so that
575 // browser startup can be instrumented.
576 if (delegate_ && delegate_->ShouldEnableProfilerRecording())
577 tracked_objects::ScopedTracker::Enable();
579 #if !defined(OS_IOS)
580 SetProcessTitleFromCommandLine(argv);
581 #endif
582 #endif // !OS_ANDROID
584 int exit_code = 0;
585 if (delegate_ && delegate_->BasicStartupComplete(&exit_code))
586 return exit_code;
588 completed_basic_startup_ = true;
590 const base::CommandLine& command_line =
591 *base::CommandLine::ForCurrentProcess();
592 std::string process_type =
593 command_line.GetSwitchValueASCII(switches::kProcessType);
595 #if !defined(OS_IOS)
596 // Initialize mojo here so that services can be registered.
597 InitializeMojo();
598 #endif
600 #if defined(OS_WIN)
601 bool init_device_scale_factor = true;
602 if (command_line.HasSwitch(switches::kDeviceScaleFactor)) {
603 std::string scale_factor_string = command_line.GetSwitchValueASCII(
604 switches::kDeviceScaleFactor);
605 double scale_factor = 0;
606 if (base::StringToDouble(scale_factor_string, &scale_factor)) {
607 init_device_scale_factor = false;
608 gfx::InitDeviceScaleFactor(scale_factor);
611 if (init_device_scale_factor)
612 gfx::InitDeviceScaleFactor(gfx::GetDPIScale());
613 #endif
615 if (!GetContentClient())
616 SetContentClient(&empty_content_client_);
617 ContentClientInitializer::Set(process_type, delegate_);
619 #if defined(OS_WIN)
620 // Route stdio to parent console (if any) or create one.
621 if (command_line.HasSwitch(switches::kEnableLogging))
622 base::RouteStdioToConsole();
623 #endif
625 // Enable startup tracing asap to avoid early TRACE_EVENT calls being
626 // ignored.
627 if (command_line.HasSwitch(switches::kTraceStartup)) {
628 base::trace_event::TraceConfig trace_config(
629 command_line.GetSwitchValueASCII(switches::kTraceStartup),
630 base::trace_event::RECORD_UNTIL_FULL);
631 base::trace_event::TraceLog::GetInstance()->SetEnabled(
632 trace_config,
633 base::trace_event::TraceLog::RECORDING_MODE);
635 #if defined(OS_WIN)
636 // Enable exporting of events to ETW if requested on the command line.
637 if (command_line.HasSwitch(switches::kTraceExportEventsToETW))
638 base::trace_event::TraceEventETWExport::EnableETWExport();
639 #endif // OS_WIN
641 #if !defined(OS_ANDROID)
642 // Android tracing started at the beginning of the method.
643 // Other OSes have to wait till we get here in order for all the memory
644 // management setup to be completed.
645 TRACE_EVENT0("startup", "ContentMainRunnerImpl::Initialize");
646 #endif // !OS_ANDROID
648 #if defined(OS_MACOSX) && !defined(OS_IOS)
649 // We need to allocate the IO Ports before the Sandbox is initialized or
650 // the first instance of PowerMonitor is created.
651 // It's important not to allocate the ports for processes which don't
652 // register with the power monitor - see crbug.com/88867.
653 if (process_type.empty() ||
654 (delegate_ &&
655 delegate_->ProcessRegistersWithSystemProcess(process_type))) {
656 base::PowerMonitorDeviceSource::AllocateSystemIOPorts();
659 if (!process_type.empty() &&
660 (!delegate_ || delegate_->ShouldSendMachPort(process_type))) {
661 MachBroker::ChildSendTaskPortToParent();
664 if (!command_line.HasSwitch(switches::kSingleProcess) &&
665 !process_type.empty() && (process_type == switches::kRendererProcess ||
666 process_type == switches::kGpuProcess)) {
667 base::mac::ScopedMachSendRight service_port =
668 BrowserIOSurfaceManager::LookupServicePort(getppid());
669 if (service_port.is_valid()) {
670 ChildIOSurfaceManager::GetInstance()->set_service_port(
671 service_port.release());
672 IOSurfaceManager::SetInstance(ChildIOSurfaceManager::GetInstance());
675 #elif defined(OS_WIN)
676 SetupCRT(command_line);
677 #endif
679 #if defined(OS_POSIX)
680 if (!process_type.empty()) {
681 // When you hit Ctrl-C in a terminal running the browser
682 // process, a SIGINT is delivered to the entire process group.
683 // When debugging the browser process via gdb, gdb catches the
684 // SIGINT for the browser process (and dumps you back to the gdb
685 // console) but doesn't for the child processes, killing them.
686 // The fix is to have child processes ignore SIGINT; they'll die
687 // on their own when the browser process goes away.
689 // Note that we *can't* rely on BeingDebugged to catch this case because
690 // we are the child process, which is not being debugged.
691 // TODO(evanm): move this to some shared subprocess-init function.
692 if (!base::debug::BeingDebugged())
693 signal(SIGINT, SIG_IGN);
695 #endif
697 #if defined(USE_NSS_CERTS)
698 crypto::EarlySetupForNSSInit();
699 #endif
701 ui::RegisterPathProvider();
702 RegisterPathProvider();
703 RegisterContentSchemes(true);
705 #if defined(OS_ANDROID)
706 int icudata_fd = g_fds->MaybeGet(kAndroidICUDataDescriptor);
707 if (icudata_fd != -1) {
708 auto icudata_region = g_fds->GetRegion(kAndroidICUDataDescriptor);
709 CHECK(base::i18n::InitializeICUWithFileDescriptor(icudata_fd,
710 icudata_region));
711 } else {
712 CHECK(base::i18n::InitializeICU());
714 #else
715 CHECK(base::i18n::InitializeICU());
716 #endif // OS_ANDROID
718 base::StatisticsRecorder::Initialize();
720 #if defined(V8_USE_EXTERNAL_STARTUP_DATA)
721 #if defined(OS_POSIX) && !defined(OS_MACOSX)
722 #if !defined(OS_ANDROID)
723 // kV8NativesDataDescriptor and kV8SnapshotDataDescriptor could be shared
724 // with child processes via file descriptors. On Android they are set in
725 // ChildProcessService::InternalInitChildProcess, otherwise set them here.
726 if (command_line.HasSwitch(switches::kV8NativesPassedByFD)) {
727 g_fds->Set(
728 kV8NativesDataDescriptor,
729 kV8NativesDataDescriptor + base::GlobalDescriptors::kBaseDescriptor);
731 if (command_line.HasSwitch(switches::kV8SnapshotPassedByFD)) {
732 g_fds->Set(
733 kV8SnapshotDataDescriptor,
734 kV8SnapshotDataDescriptor + base::GlobalDescriptors::kBaseDescriptor);
736 #endif // !OS_ANDROID
737 int v8_natives_fd = g_fds->MaybeGet(kV8NativesDataDescriptor);
738 int v8_snapshot_fd = g_fds->MaybeGet(kV8SnapshotDataDescriptor);
739 if (v8_snapshot_fd != -1) {
740 auto v8_snapshot_region = g_fds->GetRegion(kV8SnapshotDataDescriptor);
741 gin::V8Initializer::LoadV8SnapshotFromFD(
742 v8_snapshot_fd, v8_snapshot_region.offset, v8_snapshot_region.size);
743 } else {
744 gin::V8Initializer::LoadV8Snapshot();
746 if (v8_natives_fd != -1) {
747 auto v8_natives_region = g_fds->GetRegion(kV8NativesDataDescriptor);
748 gin::V8Initializer::LoadV8NativesFromFD(
749 v8_natives_fd, v8_natives_region.offset, v8_natives_region.size);
750 } else {
751 gin::V8Initializer::LoadV8Natives();
753 #else
754 gin::V8Initializer::LoadV8Snapshot();
755 gin::V8Initializer::LoadV8Natives();
756 #endif // OS_POSIX && !OS_MACOSX
757 #endif // V8_USE_EXTERNAL_STARTUP_DATA
759 if (delegate_)
760 delegate_->PreSandboxStartup();
762 if (!process_type.empty())
763 CommonSubprocessInit(process_type);
765 #if defined(OS_WIN)
766 CHECK(InitializeSandbox(params.sandbox_info));
767 #elif defined(OS_MACOSX) && !defined(OS_IOS)
768 if (process_type == switches::kRendererProcess ||
769 process_type == switches::kPpapiPluginProcess ||
770 (delegate_ && delegate_->DelaySandboxInitialization(process_type))) {
771 // On OS X the renderer sandbox needs to be initialized later in the
772 // startup sequence in RendererMainPlatformDelegate::EnableSandbox().
773 } else {
774 CHECK(InitializeSandbox());
776 #endif
778 if (delegate_)
779 delegate_->SandboxInitialized(process_type);
781 // Return -1 to indicate no early termination.
782 return -1;
785 int Run() override {
786 DCHECK(is_initialized_);
787 DCHECK(!is_shutdown_);
788 const base::CommandLine& command_line =
789 *base::CommandLine::ForCurrentProcess();
790 std::string process_type =
791 command_line.GetSwitchValueASCII(switches::kProcessType);
793 MainFunctionParams main_params(command_line);
794 main_params.ui_task = ui_task_;
795 #if defined(OS_WIN)
796 main_params.sandbox_info = &sandbox_info_;
797 #elif defined(OS_MACOSX)
798 main_params.autorelease_pool = autorelease_pool_.get();
799 #endif
801 #if !defined(OS_IOS)
802 return RunNamedProcessTypeMain(process_type, main_params, delegate_);
803 #else
804 return 1;
805 #endif
808 void Shutdown() override {
809 DCHECK(is_initialized_);
810 DCHECK(!is_shutdown_);
812 if (completed_basic_startup_ && delegate_) {
813 const base::CommandLine& command_line =
814 *base::CommandLine::ForCurrentProcess();
815 std::string process_type =
816 command_line.GetSwitchValueASCII(switches::kProcessType);
818 delegate_->ProcessExiting(process_type);
821 #if defined(OS_WIN)
822 #ifdef _CRTDBG_MAP_ALLOC
823 _CrtDumpMemoryLeaks();
824 #endif // _CRTDBG_MAP_ALLOC
825 #endif // OS_WIN
827 #if defined(OS_MACOSX) && !defined(OS_IOS)
828 autorelease_pool_.reset(NULL);
829 #endif
831 exit_manager_.reset(NULL);
833 delegate_ = NULL;
834 is_shutdown_ = true;
837 private:
838 // True if the runner has been initialized.
839 bool is_initialized_;
841 // True if the runner has been shut down.
842 bool is_shutdown_;
844 // True if basic startup was completed.
845 bool completed_basic_startup_;
847 // Used if the embedder doesn't set one.
848 ContentClient empty_content_client_;
850 // The delegate will outlive this object.
851 ContentMainDelegate* delegate_;
853 scoped_ptr<base::AtExitManager> exit_manager_;
854 #if defined(OS_WIN)
855 sandbox::SandboxInterfaceInfo sandbox_info_;
856 #elif defined(OS_MACOSX)
857 scoped_ptr<base::mac::ScopedNSAutoreleasePool> autorelease_pool_;
858 #endif
860 base::Closure* ui_task_;
862 DISALLOW_COPY_AND_ASSIGN(ContentMainRunnerImpl);
865 // static
866 ContentMainRunner* ContentMainRunner::Create() {
867 return new ContentMainRunnerImpl();
870 } // namespace content